↓ Skip to main content

Advances in Information and Computer Security

Overview of attention for book
Cover of 'Advances in Information and Computer Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy-Friendly Access Control Based on Personal Attributes
  3. Altmetric Badge
    Chapter 2 Are You Threatening My Hazards?
  4. Altmetric Badge
    Chapter 3 Complicating Process Identification by Replacing Process Information for Attack Avoidance
  5. Altmetric Badge
    Chapter 4 Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints
  6. Altmetric Badge
    Chapter 5 Key Management for Onion Routing in a True Peer to Peer Setting
  7. Altmetric Badge
    Chapter 6 Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication
  8. Altmetric Badge
    Chapter 7 Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field
  9. Altmetric Badge
    Chapter 8 Secure Multi-Party Computation for Elliptic Curves
  10. Altmetric Badge
    Chapter 9 More Constructions of Re-splittable Threshold Public Key Encryption
  11. Altmetric Badge
    Chapter 10 How to Effectively Decrease the Resource Requirement in Template Attack?
  12. Altmetric Badge
    Chapter 11 Deterministic Hard Fault Attack on Trivium
  13. Altmetric Badge
    Chapter 12 DPA Resilience of Rotation-Symmetric S-boxes
  14. Altmetric Badge
    Chapter 13 A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering
  15. Altmetric Badge
    Chapter 14 Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics
  16. Altmetric Badge
    Chapter 15 On the Security Proof of an Authentication Protocol from Eurocrypt 2011
  17. Altmetric Badge
    Chapter 16 Improved Linear Cryptanalysis of Reduced-Round MIBS
  18. Altmetric Badge
    Chapter 17 Characterization of EME with Linear Mixing
  19. Altmetric Badge
    Chapter 18 Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty
  20. Altmetric Badge
    Chapter 19 Related Key Secure PKE from Hash Proof Systems
  21. Altmetric Badge
    Chapter 20 Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
  22. Altmetric Badge
    Chapter 21 Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data
Attention for Chapter 4: Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints
Altmetric Badge

Mentioned by

twitter
2 tweeters

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints
Chapter number 4
Book title
Advances in Information and Computer Security
Published by
Springer, Cham, August 2014
DOI 10.1007/978-3-319-09843-2_4
Book ISBNs
978-3-31-909842-5, 978-3-31-909843-2
Authors

Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama

Twitter Demographics

The data shown below were collected from the profiles of 2 tweeters who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 11 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 36%
Student > Master 2 18%
Professor 1 9%
Student > Bachelor 1 9%
Other 1 9%
Other 1 9%
Unknown 1 9%
Readers by discipline Count As %
Computer Science 10 91%
Unknown 1 9%